General

  • Target

    47068-58-0x0000000000400000-0x000000000045C000-memory.dmp

  • Size

    368KB

  • Sample

    221111-ha121abghq

  • MD5

    5db507191b5fa7e4d391225d70ef5740

  • SHA1

    eaf6ffec0deb496a4c1c87fb3335cc2a262d3ff6

  • SHA256

    607d69f15f474299b62cbf1667dfaaf832d013660090c5539f8c5d149d295755

  • SHA512

    e18048814a1ea3828162164a4c999178ce4a3e7b745077e785cd98a7afb9cc065daadee35a8c4ecc913cf6346e7a89ffaebc24c50d648d0beacbb2d41a4808ea

  • SSDEEP

    3072:sfiINxfVjq7ctN4J9BBgzZizRnQYdS4a0CFaQ6IpJBw5FWrCHq6eUoBvOcFD:sf7W9BW9h4X03fxw6r4q6eUYd

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55.5

Botnet

1707

C2

https://t.me/tg_turgay

https://ioc.exchange/@xiteb15011

Attributes
  • profile_id

    1707

Targets

    • Target

      47068-58-0x0000000000400000-0x000000000045C000-memory.dmp

    • Size

      368KB

    • MD5

      5db507191b5fa7e4d391225d70ef5740

    • SHA1

      eaf6ffec0deb496a4c1c87fb3335cc2a262d3ff6

    • SHA256

      607d69f15f474299b62cbf1667dfaaf832d013660090c5539f8c5d149d295755

    • SHA512

      e18048814a1ea3828162164a4c999178ce4a3e7b745077e785cd98a7afb9cc065daadee35a8c4ecc913cf6346e7a89ffaebc24c50d648d0beacbb2d41a4808ea

    • SSDEEP

      3072:sfiINxfVjq7ctN4J9BBgzZizRnQYdS4a0CFaQ6IpJBw5FWrCHq6eUoBvOcFD:sf7W9BW9h4X03fxw6r4q6eUYd

    Score
    1/10

MITRE ATT&CK Matrix

Tasks